Supporting the Alert Standards Format (ASF) 2.0 Specification

Size: px
Start display at page:

Download "Supporting the Alert Standards Format (ASF) 2.0 Specification"

Transcription

1 White Paper Supporting the Alert Standards Format (ASF) 2.0 Specification Preserve Your Investment Stick with the Standard September 2005

2 Executive Summary Today s IT manager is under pressure to reduce the costs of maintaining the network and computing infrastructure. The typical enterprise employs a manageability software suite to facilitate this effort. However, software alone cannot solve all manageability challenges. In some cases, hardware-based manageability technology can provide additional capabilities. PCs based on a technology called Alert Standard Format (ASF) 2.0 can provide such functionality to the IT manager. ASF offers the following benefits: Reduces new PC provisioning time from 4.5 hours to 25 minutes (sample: 20 PCs) Makes software patching more secure and reliable Reduces costly desk-side visits by fixing common PC problems online Protects PCs from physical threats: theft, misplacement, and malfunction Leading PC manufacturers such as Dell, HP, and Fujitsu-Siemens have already shipped nearly 75 million ASF-enabled PCs, and will continue offering ASF 2.0 in upcoming PC lines. These systems can be enabled and controlled using any manageability console that supports ASF 2.0. What is ASF? ASF is a standard created by the Distributed Management Task Force (DMTF). It is implemented in the PC s hardware and firmware, and is managed from a remote console. ASF provides robust management features that function while the PC does not have an operating system (OS) present. When the OS is present in a client PC, much of its remote functionality is available using various tools. However, the client PC is often in an OS-absent state either because the PC is turned off, has gone into a low power mode, or has hung during operation. As a result, the ability to remotely interact with a PC is severely limited. This is why ASF was created: to provide a suite of features that can be accessed remotely and while the PC does not have an OS present. These features fall into two categories: Alerting: a PC can alert a remote management console with - I have a problem Remote Control: a remote management console can control an OS-absent PC. Page 2

3 ASF serves as the conduit for a manageability infrastructure. The IT manager interacts directly with the management console, perhaps unaware of the underlying technology, or "plumbing, which enables the employed features (see Figure 1). Other options for the plumbing may exist, but ASF is the only one that is standardsbased and widely deployed. IT Administrator Management Console Alerts Remote Console Remote Control Remote Boot Windows OS-Present ASF OS-Absent Other MNG OS-Absent Figure 1: Client Management Components Page 3

4 The ASF Standard The industry has long recognized the requirement for some type of OS-absent functionality. In the early 1990 s, the first of several proprietary client manageability technologies was developed. Ultimately, the PC industry demanded a standards-based approach, thus giving rise to ASF. The fact that ASF is standards-based is highly significant. Standards are the only way to ensure the key technology traits that IT demands. They also provide the following benefits: Interoperability: most enterprise environments are heterogeneous supporting PCs from multiple vendors, and using different manageability consoles. The only way to ensure out-of-the-box interoperability is for the technology to be based on a management standard that all vendors understand and test uniformly. Security: A truly effective security system follows a comprehensible paradigm and is open to industry scrutiny. Proprietary security solutions represent only one company s methodology to ensuring network integrity. Choice: IT managers want to base their hardware purchases on priceperformance criteria; they do not want to be restricted by compliance with a proprietary or outdated scheme. Standards eliminate this problem. Stability: A standard is industry-driven, and modifications are typically subject to an open process that provides a buffer against arbitrary change. Proprietary systems can be altered subjectively by the owning company. This condition can only benefit the provider as the customer is then required to purchase an upgrade to take advantage of new changes and features. Page 4

5 ASF Installed Base For IT to be willing to activate any manageability technology, a significant portion of the installed hardware infrastructure must support it. IT simply won t change their workflows to accommodate the new technology until it can be rolled out onto percent of the enterprise s PCs. ASF solves this problem for IT because the vast majority of PCs sold by Tier 1 PC OEMs over the last three years contain ASFenabled hardware. By the end of 2005, nearly 100 million PCs with ASF-enabled hardware will have been deployed. And this run rate is expected to continue through 2007 (see Figure 2). Figure 2: ASF Installed Base and Projected Shipments Any new manageability technology would not enjoy the benefits of an installed base. Because the typical PC refresh cycle within the enterprise is four years, IT would not be able to turn it on until That is the benefit of ASF it can be turned on today. Page 5

6 What Drives the Cost of the PC Infrastructure? IT organizations have historically been reluctant to manage clients directly. This is surprising, given that the industry has long known the rule of thumb for PC costs: 80 percent goes to managing the PC, while only 20 percent constitutes the cost of the hardware. However, using conventional IT tools, cost-effective management of client PCs is still difficult. Most enterprises simply rely on users to perform a reset (Ctrl-Alt-Del) or hard re-boot to solve typical problems. With a perpetual focus on cost reduction, IT organizations need to scrutinize the true costs of managing PCs. PC management costs not only include resolving client issues (e.g. hung PCs, blue screens, and boot problems) but also consist of deployment and regular maintenance costs. The following are recognized as key cost drivers in the computing infrastructure: Provisioning a new PC is a time consuming, manual process that can become highly serialized when large numbers of systems are involved. The critical nature of this manual task requires a skilled technician. Software patching can be unreliable due to limitations with Wake on LAN (WoL), a key technology used to push patches overnight to PCs that are off or in a sleep state. Desk-side visits are expensive since skilled IT technicians must be dispatched to the client site, even for easily diagnosed issues. User downtime is an added cost of desk-side visits as it often takes time for the technician to arrive and fix the problem. Physical threats to PCs can adversely impact users and increase IT support costs. Examples include stolen PCs, changed hardware configurations, and malfunctioning hardware. Page 6

7 Client Manageability Use Cases The following sections detail typical use cases and demonstrate how IT managers can take advantage of their ASF-capable systems. Use Case 1: Shortening PC Provisioning When provisioning new systems, personnel typically must download a standard corporate image to the hard drive. This work is performed by an IT technician on a provisioning bench. With the current methods, this is the process: All I/O (keyboard, mouse, and monitor) must be plugged into the new machine. Not only is this very time consuming, but the technician is also limited by space and the number of I/O peripherals available. The process is serialized. The PC is manually turned on by pressing the power button. The IT manager physically sits in front of the PC, monitors the boot process, and presses the "F8" key to prompt the boot option screen. The technician then boots to PXE and downloads the corporate image. PC is then manually shut down, and all I/O is manually detached. Page 7

8 This process can take up to 25 minutes per PC, assuming a typical image size. In contrast, ASF removes many of these manual steps: Plug in the LAN cable Use the management console to run the provisioning script. Using the power of ASF, the PC will automatically power on, change to a PXE boot option, download the image, and shut down. This occurs with no intervention by the technician. Unplug the LAN cable Since ASF only requires a network connection to the new PC (no I/O connections), the process is run completely in parallel fashion (see Figure 3). Figure 3: PC Provisioning Page 8

9 Table 1 summarizes the provisioning steps and times for the processes illustrated in Figure 3. Table 1: Provisioning Time Comparison Today ASF New Machines (to be provisioned) IT bench capacity 2 - (Note: bench capacity refers to limitation in space and I/O devices) Unpack, connect power + LAN (minutes) 8 8 Connect power + LAN (minutes) 1 2 Connect I/O (minutes) 1 - Total setup time (minutes) Power on PC, wait to press F8 2 - Download one image (minutes) Total provisioning time, one PC Number of times to repeat (if serialized) 10 - Total Time (hours) Time Savings (hours) 4.1 Page 9

10 Use Case 2: Improving Software Patching An essential IT challenge is that of defending the network against viruses and other malicious attacks that cripple the network and impact business. Based on a recent survey conducted by Information Week magazine, 21 percent of businesses had a minor financial loss due to a cyberattack 1. The ability to securely and reliably patch the software image on the enterprise s PCs is fundamental to protecting against these attacks. Often, these patches are pushed to client PCs overnight using WoL (Wake on LAN). WoL technology resides in a PC's managed network adapter and motherboard. It is used to turn on PCs remotely, but has several limitations which ASF solves. Table 2 compares both methods and illustrates the advantages of ASF Remote Management and Control Protocol (RMCP). Table 2: WoL Compared to ASF Category Problem Description WoL ASF Security IT requires a secure communication channel between management console and client. No Yes: HMAC/SHA-1 based authentication Feedback IT requires confirmation that the client is responding and identification/notification of issues. No Yes: Two-way communication Cross subnets IT requires capability to deploy S/W patches across complex networks (large enterprises). No Yes: Can cross subnets Reset hung PC IT requires a method to power cycle a PC if problem encountered during patch procedure. No Yes: Remote power reset Page 10

11 Use Case 3: Repairing a Hung PC One of the most costly aspects of PC maintenance is a desk-side visit by a technician to diagnose and repair a PC that is hung and will not boot. Because the PC cannot reach an OS-present state, most of the over-the-wire tools that IT would normally use are not available. The typical types of problems which can cause a PC to hang fall into two categories (see Figure 4): Phase 1: typically associated with hardware and BIOS problems Phase 2: those caused by file problems. Power On BIOS Post Done Full OS Up BIOS Running POST OS Loading Phase 1 Source of P1 Boot Failure HW removed (HD, CPU Memory) HW fails during initialization User changes BIOS settings Modified BIOS Phase 2 Source of P2 Boot Failure User inadvertently corrupts files New OS patch install causes issue Malware corrupts OS or driver files Figure 4: Typical Boot Issues When problems such as these occur, a Level 2 or above technician will need to be sent to the user s desk to determine what is wrong and to repair the problem. In some cases multiple visits are required. In addition, there is an implicit cost attached to user downtime. It is easy to see that the total cost of a hung PC rapidly becomes significant (see Figure 5). $450 $400 $350 NO ASF $300 Total Cost $250 $200 $150 WITH ASF $100 $50 $ IT Deskside Response Time (minutes) Figure 5: Total Cost for Repairing a Hung PC Page 11

12 ASF delivers an effective method to reduce these costs by providing tools for IT to diagnose and repair common PC problems over-the-wire, even if the PC OS is absent. In so doing, ASF allows IT to address more issues with Level 1 technicians, rather than higher skill Level 2 or 3 specialists who are much more costly. Overall user down time is decreased as the user no longer has to wait for a skilled technician to physically arrive at the desk. Figure 6 shows an example of how ASF can help diagnose and repair common PC problems, and how IT would react to a help desk call with a complaint about a hung PC. User call Or ASF PET Indicating System Boot failure RMCP reboot RMCP to pull ASF Event Log RMCP boot, change boot options to PXE boot PXE boot to known good image via WinPE or BartPE Done HW Failure? BIOS settings changed? ID bad files? Backup user data over wire, re-image HD via PXE Query Inventory Database or Offline Mailbox RMCP to reset defaults Download new file(s) Done Replace HW Boot? Likely a Phase 2 issue Boot? Done Done Done Source of P1 Boot Failure HW removed (HD, CPU Memory) HW fails during initialization User changes BIOS settings Modified BIOS Source of P2 Boot Failure User inadvertently corrupts files New OS patch install causes issue Malware corrupts OS or driver files Phase 1 Phase 2 Figure 6: Procedures to Repair a Hung PC using ASF The following procedural steps are typical: User calls IT help desk to report a problem Technician uses the ASF power cycle feature to reboot the PC. If successful, the problem is solved. If the basic re-boot does not solve the problem, the technician remotely retrieves the ASF Event Log. The log shows boot progress and helps the technician pinpoint common hardware problems. If a hardware problem is identified, the technician queries the company s hardware database to identify the type of hardware installed in the PC, secures the component from inventory, and walks to the user s desk to replace the faulty hardware. Page 12

13 If no hardware problem is detected, the ASF Event Log can then be used to check for evidence of unintended changes to or corruption of the BIOS. For example, if the problem initiates because the user has inadvertently changed the BIOS settings, an ASF command can be issued to reset the BIOS settings to default. If no hardware or BIOS issues are detected, then it is likely that the cause of the hang is not a Phase 1 issue, but instead a Phase 2 issue. The PC is rebooted again and the ASF is used to remotely change the boot options to allow a PXE boot. A known good image can be loaded onto the PC to allow it to be brought to an OS-present state. At this point, the file system can be accessed and the file problem possibly repaired. If the technician cannot repair the problem, he can use PXE or iscsi to re-image the system. Page 13

14 Use Case 4: Defending Against Physical Threats As a company grows larger, physical asset management becomes increasingly more difficult. Protection of valuable assets is essential to controlling costs. This can be a very difficult task. In 2003 alone, 600,000 computers were stolen, 2 which equates to a loss of approximately $0.5 billion (based on a unit cost of $800). In addition to stolen PCs, other threats exist that inhibit the ability to use or maintain the PC: Theft of components: PC memory or CPU are commonly stolen items Misplacement of PCs: Large enterprises grow via acquisitions and cannot always account for all assets Unauthorized change of PC configuration: Users add unauthorized hardware Malfunctioning hardware: Fan failure is a common example ASF has pre-defined alerts that signal any of these physical threats. For example, an IT administrator is warned via the management console that a physical threat occurred. Since ASF supports OS-absent manageability, these threats can also be signaled even if PCs are off or hung. Page 14

15 Conclusion Remote client manageability that functions in an OS-absent environment can save IT departments a significant amount of money. This important capability simplifies PC provisioning, improves software patching, reduces desk-side visits, and protects the enterprise against physical PC threats. All of these factors help reduce IT support costs and user downtime, therefore reducing the total support cost. To enable client manageability in today s enterprise, ASF is the hardware plumbing of choice. It is standards-based, and thus more secure, interoperable, and widely supported than a proprietary scheme. It also boasts a massive installed base of 75 million PCs with ASF-enabled hardware. Today, this allows IT to turn on ASF on a majority of the PCs in their enterprise. References 1 InformationWeek Research s U.S. Information Security Survey Microsoft ( Page 15

16 Broadcom, the pulse logo, Connecting everything, the Connecting everything logo, BroadSAFE, BroadVoice and BroadVoice32 are trademarks of Broadcom Corporation and/or its affiliates in the United States, certain other countries and/or the EU. Any other trademarks or trade names mentioned are the property of their respective owners. Phone: Fax: Web: BROADCOM CORPORATION Alton Parkway, P.O. Box Irvine, California by BROADCOM CORPORATION. All rights reserved. ASF-WP102-R 10/10/05

ASF: Standards-based Systems Management. Providing remote access and manageability in OS-absent environments

ASF: Standards-based Systems Management. Providing remote access and manageability in OS-absent environments ASF: Standards-based Systems Management Providing remote access and manageability in OS-absent environments Contents Executive Summary 3 The Promise of Systems Management 3 Historical Perspective 3 ASF

More information

AMD PRO A-SERIES APUS: OUT-OF-BAND CLIENT MANAGEMENT OVERVIEW

AMD PRO A-SERIES APUS: OUT-OF-BAND CLIENT MANAGEMENT OVERVIEW AMD PRO A-SERIES APUS: OUT-OF-BAND CLIENT MANAGEMENT OVERVIEW TABLE OF CONTENTS INTRODUCTION 3 OUT-OF-BAND CLIENT MANAGEMENT 4 What is Out-of-Band Client Management? 4 How Open Standards Can Benefit Your

More information

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology Dell Client Systems Take Control of Your Environment Powered by Intel Core 2 processor with vpro technology Simplifying IT As IT infrastructures grow, heterogeneous environments expand. Growing infrastructures

More information

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE White Paper Meeting the Five Key Needs of Next-Generation Cloud Computing Networks Cloud computing promises to bring scalable processing capacity to a wide range of applications in a cost-effective manner.

More information

TruManage Technology Remote Management and Control of Mobile and Desktop Clients

TruManage Technology Remote Management and Control of Mobile and Desktop Clients Remote Management and Control of Mobile and Desktop Clients INTRODUCTION A reliable and secure IT infrastructure is essential for every business. This challenge is multifaceted as organizations contend

More information

From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller

From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller

More information

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various

More information

Client Manageability. Out-of-Band Management with DMTF DASH. Valerie K. Kane Commercial Client Product Group, AMD

Client Manageability. Out-of-Band Management with DMTF DASH. Valerie K. Kane Commercial Client Product Group, AMD Client Manageability Out-of-Band Management with DMTF DASH Valerie K. Kane Commercial Client Product Group, AMD Agenda Overview: Out-of-Band Client Management Standards-Based Client Management DASH: Key

More information

TruManage Technology Remote Management and Control of Servers

TruManage Technology Remote Management and Control of Servers Remote Management and Control of Servers INTRODUCTION A reliable and secure server infrastructure is essential for every cloud computing or data center environment. This challenge is multifaceted as organizations

More information

Proactively Managing Servers with Dell KACE and Open Manage Essentials

Proactively Managing Servers with Dell KACE and Open Manage Essentials Proactively Managing Servers with Dell KACE and Open Manage Essentials A Dell Technical White Paper Dell KACE Dell Open Manage Essentials THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN

More information

Argon Client Management Services- Frequently Asked Questions (FAQ)

Argon Client Management Services- Frequently Asked Questions (FAQ) Simplifying Client Management FAQ Argon - Frequently Asked Questions (FAQ) What are the server requirements? Operating Systems: Windows 98, Windows NT Version 4.0 (Service Pack 4 or later, IE 4 or later),

More information

integrated lights-out in the ProLiant BL p-class system

integrated lights-out in the ProLiant BL p-class system hp industry standard servers august 2002 integrated lights-out in the ProLiant BL p-class system technology brief table of contents executive summary 2 introduction 2 management processor architectures

More information

A+ Practical Applications Solution Key

A+ Practical Applications Solution Key A+ Practical Applications Solution Key Module 1 Assignment: Introducing Microsoft Windows - answer the following questions: 1. What attributes are available in the NTFS file system that are not available

More information

Alert on LAN 2. Information Brief. Worth remembering. Overview. Proactive asset protection

Alert on LAN 2. Information Brief. Worth remembering. Overview. Proactive asset protection Proactive asset protection Alert on LAN 2 Information Brief Worth remembering Alert on LAN 2 extends the system administrator s capabilities to take corrective action on alert-generation technology introduced

More information

What s New in Ghost Solution Suite 3.0

What s New in Ghost Solution Suite 3.0 What s New in Ghost Solution Suite 3.0 This document highlights some of the most impactful new features of Ghost Solution Suite 3.0 For more comprehensive information, please view the Ghost Solution Suite

More information

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager Hardware + Software Solutions for The Best in Client Management & Security Malcolm Hay Intel Manager vpro - Hardware Management & Security for the New Era of End User Computing Hardware Management Intel

More information

ALTIRIS Deployment Solution 6.8 PXE Overview

ALTIRIS Deployment Solution 6.8 PXE Overview ALTIRIS Deployment Solution 6.8 PXE Overview Notice Altiris AAA Document 2006 Altiris, Inc. All rights reserved. Document Date: October 3, 2006 Altiris, Inc. is a pioneer of IT lifecycle management software

More information

SSD Firmware Update Utility Guide

SSD Firmware Update Utility Guide SSD Firmware Update Utility Guide Crucial m4 2.5 SSD Firmware Revision 070H Firmware Update Guide for Windows 8 (Update from Rev 0001, 0002, 0009, 0309, 000F, 010G, 040H to Rev 070H) Introduction This

More information

WINDOWS SERVER MONITORING

WINDOWS SERVER MONITORING WINDOWS SERVER Server uptime, all of the time CNS Windows Server Monitoring provides organizations with the ability to monitor the health and availability of their Windows server infrastructure. Through

More information

Zinstall HDD User Guide

Zinstall HDD User Guide Zinstall HDD User Guide Thank you for purchasing Zinstall. If you have any questions, issues or problems, please contact us: Toll-free phone: (877) 444-1588 International callers: +1-877-444-1588 Support

More information

Q A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ

Q A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ DELL CLIENT MANAGER 3.0 FAQ dell client manager 3.0 FAQ Do i need to license dell client manager standard edition? 2 What are the system requirements and prerequisites for installation? 2 When installing

More information

vpro Prerequisites and Trade-offs for the dc7700 Business PC with Intel vpro Technology

vpro Prerequisites and Trade-offs for the dc7700 Business PC with Intel vpro Technology vpro Prerequisites and Trade-offs for the dc7700 Business PC with Intel vpro Technology Introduction............................................................ 2 Prerequisites............................................................

More information

Intel AMT Provides Out-of-Band Remote Manageability for Digital Security Surveillance

Intel AMT Provides Out-of-Band Remote Manageability for Digital Security Surveillance WHITE PAPER Intel Active Management Technology Intel Digital Security & Surveillance Intel Manageability Reference Console Intel Core Processors Intel vpro Intel AMT Provides Out-of-Band Remote Manageability

More information

Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12.

Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12. Instrument Software Update Instructions Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Purpose Upgrading an older version to A.12.09 and above The purpose of this document is to outline the instrument

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability

Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability White Paper Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability The new TCP Chimney Offload Architecture from Microsoft enables offload of the TCP protocol

More information

McAfee epolicy Orchestrator * Deep Command *

McAfee epolicy Orchestrator * Deep Command * SOLUTION BLUEPRINT IT SECURITY MANAGEMENT McAfee epolicy Orchestrator * Deep Command * Industry IT security management across industries Business Challenge Comprehensive security management solution allowing

More information

Unifying IT How Dell Is Using BMC

Unifying IT How Dell Is Using BMC Unifying IT Management: How Dell Is Using BMC Software to Implement ITIL ABSTRACT Companies are looking for ways to maximize the efficiency with which they plan, deliver, and manage technology services.

More information

Getting Started. rp5800, rp5700 and rp3000 Models

Getting Started. rp5800, rp5700 and rp3000 Models Getting Started rp5800, rp5700 and rp3000 Models Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows

More information

HP Client Manager 6.2

HP Client Manager 6.2 HP Client Manager 6.2 Introduction... 2 New Features in HPCM 6.2... 4 Understanding how HPCM works... 5 Extensive reporting capability... 5 HPCM in operation... 6 Client inventory... 6 Health monitoring...

More information

HP Client Manager 6.1

HP Client Manager 6.1 HP Client Manager 6.1 Introduction... 2 New Features in HPCM 6.1... 4 Understanding how HPCM works... 6 Extensive reporting capability... 7 HPCM in operation... 7 Client inventory... 7 Health monitoring...

More information

Apple Technical White Paper Best Practices for Deploying Mac with OS X

Apple Technical White Paper Best Practices for Deploying Mac with OS X Best Practices for Deploying Mac with OS X OS X Mountain Lion v10.8 Contents Overview... 3 OS X Installation Basics... 3 Installer Technology... 3 OS X Recovery... 4 Internet Recovery... 4 External OS

More information

Why Use ThinManager to Manage Thin Clients? White Paper. For more information, please visit: www.thinmanager.com

Why Use ThinManager to Manage Thin Clients? White Paper. For more information, please visit: www.thinmanager.com Why Use ThinManager to Manage Thin Clients? Table of Contents Terminal Services... 1 Terminal Server Relationship... 1 Centralized Computing Benefit... 1 Managing All The Pieces... 2 Centralized Client

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range. Materials Required

ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range. Materials Required ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range The Intel NUC is a small form factor computer that incorporates several models from Intel Core processors to the economical Single

More information

ReadyNAS OS 6 Desktop Storage Systems

ReadyNAS OS 6 Desktop Storage Systems ReadyNAS OS 6 Desktop Storage Systems Hardware Manual Models: ReadyNAS 102 ReadyNAS 104 ReadyNAS 312 ReadyNAS 314 ReadyNAS 316 ReadyNAS 516 ReadyNAS 716X EDA 500 October 2013 202-11206-04 350 East Plumeria

More information

MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement

MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement MaxAttach NAS 4000 Series MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement DOCUMENT OVERVIEW Who Should Use This Instruction Set This MaxAttach NAS 4000 Series by Maxtor HDD Replacement Instruction

More information

iscsi Boot Functionality: Diskless Booting Enables SANlike Benefits at Lower Costs

iscsi Boot Functionality: Diskless Booting Enables SANlike Benefits at Lower Costs iscsi Boot Functionality: Diskless Booting Enables SANlike Benefits at Lower Costs and Dated: June 2007 Page 1 of 7 8/10/2007 Copyright 2003-2007 All Rights Reserved No part of this document may be reproduced,

More information

ACU-1000 Manual Addendum Replacement of CPM-2 with CPM-4

ACU-1000 Manual Addendum Replacement of CPM-2 with CPM-4 ACU-1000 Manual Addendum Replacement of CPM-2 with CPM-4 1 PURPOSE:... 1 2 CPM-4/CPM-2 COMPATIBILITY... 2 2.1 NETWORK CABLES... 2 2.2 FACTORY DEFAULT SETTINGS... 2 2.3 CHANGING THE RS-232 SERIAL PORT BAUD

More information

Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER

Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER Introduction This paper describes how GANTECH, a systems integrator specializing in virtualization, used

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Dell High Availability Solutions Guide for Microsoft Hyper-V

Dell High Availability Solutions Guide for Microsoft Hyper-V Dell High Availability Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

Mobile Device Management: Are You In Control?

Mobile Device Management: Are You In Control? Mobile Device Management: Are You In Control? by Sarah Howland With remote access enabled by its MDM (mobile device management) solution, DirectTV installer MasTec has reduced device downtime to save more

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time Congratulations on your purchase of the GIGABYTE Notebook! This Manual will help you to get started with setting up your notebook. For more detailed information, please visit our website at http://www.gigabyte.com.

More information

Intel RAID Controller Troubleshooting Guide

Intel RAID Controller Troubleshooting Guide Intel RAID Controller Troubleshooting Guide A Guide for Technically Qualified Assemblers of Intel Identified Subassemblies/Products Intel order number C18781-001 September 2, 2002 Revision History Troubleshooting

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

User Guide for Windows 10

User Guide for Windows 10 User Guide for Windows 10 System requirements E10684 First Edition July 2015 To facilitate a smoother transition from your previous operating system, read the system requirements below before upgrading

More information

VMware vsphere 5 Quick Start Guide

VMware vsphere 5 Quick Start Guide VMware vsphere 5 Quick Start Guide This document is created to provide some basic information about VMware, and allow you, the customer, to determine when and how to engage us for support or other needs

More information

Intel Trusted Platforms Overview

Intel Trusted Platforms Overview Intel Trusted Platforms Overview Greg Clifton Intel Customer Solutions Group Director, DoD & Intelligence 2006 Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Cautions When Using BitLocker Drive Encryption on PRIMERGY Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point of your

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time P34 V6.0 Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Apache Tomcat Release 12.1.0.1.0 E28545-04 February 2014 This document provides installation instructions and configuration information

More information

9 Headless Systems & Remote Management

9 Headless Systems & Remote Management 9 Headless Systems & Remote Management Headless support is a key feature of XPe. Since the nature of the XP operating system is to have a graphical interface, designing an XPe headless device involves

More information

Virtual Desktop Infrastructure

Virtual Desktop Infrastructure Virtual Desktop Infrastructure Improved manageability and availability spur move to virtualize desktops Many companies have turned to virtualization technologies for their servers and in their data centers

More information

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2

More information

Intel Management Engine BIOS Extension (Intel MEBX) User s Guide

Intel Management Engine BIOS Extension (Intel MEBX) User s Guide Intel Management Engine BIOS Extension (Intel MEBX) User s Guide User s Guide For systems based on Intel B75 Chipset August 2012 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Install Instructions and Deployment Options

Install Instructions and Deployment Options Hygiena SureTrend 4.0 Install Install Instructions and Deployment Options Hygiena 7/2/2014 This document will describe the basic Install process and different deployment options for SureTrend 4.0. 0 P

More information

Reborn Card NET. User s Manual

Reborn Card NET. User s Manual Reborn Card NET User s Manual Table of Contents Notice Before Installation:... 2 System Requirements... 3 1. First Installation... 4 2. Hardware Setup... 4 3. Express Installation... 6 4. How to setup

More information

3.5 EXTERNAL NETWORK HDD. User s Manual

3.5 EXTERNAL NETWORK HDD. User s Manual 3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility

More information

Automated Server Provisioning Benefits and Practices

Automated Server Provisioning Benefits and Practices Automated Server Provisioning Benefits and Practices White Paper August 31, 2004 2004 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

Installing and Upgrading to Windows 7

Installing and Upgrading to Windows 7 Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make

More information

NEC Virtual PC Center (VPCC) Product and Technology Overview

NEC Virtual PC Center (VPCC) Product and Technology Overview NEC Virtual PC Center (VPCC) Product and Technology Overview Virtual PC Center is NEC s complete software solution to deploy and manage virtual desktop users throughout your entire organization. It is

More information

ATTO ThunderLink Thunderbolt to SAS/SATA Troubleshooting Guide

ATTO ThunderLink Thunderbolt to SAS/SATA Troubleshooting Guide ATTO ThunderLink Thunderbolt to SAS/SATA Troubleshooting Guide 1 5 5 C r o s s P o i n t P a r k w a y A m h e r s t, N Y 1 4 0 6 8 P. 7 1 6. 6 9 1. 1 9 9 9 F. 7 1 6. 6 9 1. 9 3 5 3 w w w. a t t o t e

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Migrating to RSA Authentication Manager Version 8.1

Migrating to RSA Authentication Manager Version 8.1 Migrating to RSA Authentication Manager Version 8.1 2014 EMC Corporation All Rights Reserved Rev. P3 1 Why Migrate to AM 8.1? Solid, quality release puts your authentication platform on excellent footing

More information

BIOS Update Release Notes

BIOS Update Release Notes BIOS Update Release Notes PRODUCTS: DG31PR, DG31PRBR (Standard BIOS) BIOS Version 0070 About This Release: February 8, 2010 Integrated Graphics Option ROM Revision: PXE LAN Option ROM Revision: Improved

More information

Windows Deployment Services

Windows Deployment Services Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown Rdrown@Purdue.edu Systems Administrator for Krannert School of Management at Purdue University Owner

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

whitepaper Absolute Manage: Client Management Managing Macs in a Windows Environment

whitepaper Absolute Manage: Client Management Managing Macs in a Windows Environment Absolute Manage: Client Management Intelligent, Automated, Cross-Platform Management of All Your Computers if you can buy one, and only one set of tools for managing your Mac network, Absolute Manage would

More information

HP Windows 7 Onsite Upgrade Service

HP Windows 7 Onsite Upgrade Service HP Windows 7 Onsite Upgrade Service HP Care Pack Services Technical data The Windows 7 Onsite Upgrade Service provides your company with onsite installation, setup, and training for the Microsoft Windows

More information

Performance Optimization Guide

Performance Optimization Guide Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.

More information

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology Preface Intel has developed a series of unique Solution Recipes designed for channel

More information

Enabling Deskside Manageability and Productivity. The CompuCom EUC Workbench Powered by Intel vpro Technology

Enabling Deskside Manageability and Productivity. The CompuCom EUC Workbench Powered by Intel vpro Technology Enabling Deskside Manageability and Productivity The CompuCom EUC Workbench Powered by Intel vpro Technology There is no question that today s enterprise IT faces escalated demands from supporting a mobile

More information

Migrating to Windows 7 - A challenge for IT Professionals

Migrating to Windows 7 - A challenge for IT Professionals I D C T E C H N O L O G Y S P O T L I G H T Migrating to Windows 7? Technology Points to Consider September 2010 Adapted from Worldwide IT Asset Management Software 2009 2013 Forecast and 2008 Vendor Shares

More information

TOP TEN CONSIDERATIONS

TOP TEN CONSIDERATIONS White Paper TOP TEN CONSIDERATIONS FOR CHOOSING A SERVER VIRTUALIZATION TECHNOLOGY Learn more at www.swsoft.com/virtuozzo Published: July 2006 Revised: July 2006 Table of Contents Introduction... 3 Technology

More information

TeamViewer Manual Wake-on-LAN

TeamViewer Manual Wake-on-LAN TeamViewer Manual Wake-on-LAN Rev 11.1-201601 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of contents 1 About Wake-on-LAN 3 2 Requirements 5 3 Set up Windows 6 3.1 Configure

More information

Dell Client BIOS: Signed Firmware Update

Dell Client BIOS: Signed Firmware Update Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational

More information

An Oracle White Paper October 2011. Oracle Database Appliance

An Oracle White Paper October 2011. Oracle Database Appliance An Oracle White Paper October 2011 Oracle Database Appliance Introduction The Oracle Database Appliance is a new engineered system consisting of hardware and software that saves customers time and money

More information

Getting Started. HP Retail Systems

Getting Started. HP Retail Systems Getting Started HP Retail Systems Copyright 2012, 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft and Windows are U.S. registered

More information

McAfee Firewall Enterprise

McAfee Firewall Enterprise Hardware Guide Revision C McAfee Firewall Enterprise S1104, S2008, S3008 The McAfee Firewall Enterprise Hardware Product Guide describes the features and capabilities of appliance models S1104, S2008,

More information

User Guide. SUSIAccess. Remote Device Management

User Guide. SUSIAccess. Remote Device Management User Guide SUSIAccess Remote Device Management Edition 2.0 May 10 2012 Part. No. 200EMBSA01 Printed in Taiwan 2 Advantech SUSIAccess User Manual ADVANTECH SUSIACCESS USER MANUAL... 3 1. SOLUTION OVERVIEW...

More information

Weather Direct Displays show Lost Forecast (blank boxes in the picture icons)

Weather Direct Displays show Lost Forecast (blank boxes in the picture icons) Weather Direct Displays show Lost Forecast (blank boxes in the picture icons) Many routine events can cause a Lost Forecast situation. Examples include: Power outage Change batteries Internet down in your

More information

ALTIRIS Deployment Solution 6.8 Preboot Automation Environment

ALTIRIS Deployment Solution 6.8 Preboot Automation Environment ALTIRIS Deployment Solution 6.8 Preboot Automation Environment The information contained in the Altiris knowledgebase is subject to the Terms of Use as outlined at http://www.altiris.com/legal/termsofuse.asp.

More information

Best Practices in Deploying Anti-Malware for Best Performance

Best Practices in Deploying Anti-Malware for Best Performance The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying

More information

User Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000

User Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 User Manual Version 4.0.0.5 User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 I Endpoint Protector Appliance User Manual Table of Contents 1. Endpoint Protector Appliance Setup... 1 1.1.

More information

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature Table of Content Error Messages List... 2 Troubleshooting the Storage System... 3 I can t access the Manager... 3 I forgot the password for logging in to the Manager... 3 The users can t access the shared

More information

ALIENWARE MOBILE MANUAL The contents herein are subject to change without notice. 1996-2004 Alienware Corporation. All rights reserved.

ALIENWARE MOBILE MANUAL The contents herein are subject to change without notice. 1996-2004 Alienware Corporation. All rights reserved. ALIENWARE MOBILE MANUAL The contents herein are subject to change without notice. 1996-2004 Alienware Corporation. All rights reserved. Reproduction of this manual in any manner without the prior written

More information

VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.

VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using

More information

Call Center Achieves 428% ROI Using Dynamic Virtual Clients on PCs with Intel Core 2 Processor with vpro Technology

Call Center Achieves 428% ROI Using Dynamic Virtual Clients on PCs with Intel Core 2 Processor with vpro Technology White Paper and ROI Study Intel Core 2 Processor with vpro Technology Lenovo Secure Managed Client (SMC)* Dynamic Virtual Client Food and Beverage Industry Call Center Achieves 428% ROI Using Dynamic Virtual

More information

Frequently Asked Questions: EMC UnityVSA

Frequently Asked Questions: EMC UnityVSA Frequently Asked Questions: EMC UnityVSA 302-002-570 REV 01 Version 4.0 Overview... 3 What is UnityVSA?... 3 What are the specifications for UnityVSA?... 3 How do UnityVSA specifications compare to the

More information

HP StoreVirtual DSM for Microsoft MPIO Deployment Guide

HP StoreVirtual DSM for Microsoft MPIO Deployment Guide HP StoreVirtual DSM for Microsoft MPIO Deployment Guide HP Part Number: AX696-96254 Published: March 2013 Edition: 3 Copyright 2011, 2013 Hewlett-Packard Development Company, L.P. 1 Using MPIO Description

More information

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information